Artle Hre System Ver Wal Tung 2010

download Artle Hre System Ver Wal Tung 2010

of 154

Transcript of Artle Hre System Ver Wal Tung 2010

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    1/154

    AIX 6 SystemAdministration I:Implementation(Course code AU14)

    Student ExercisesERC 12.0

    IBM certified course material

    4.1

    over

    Front cover

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    2/154

    Student Exercises

    February 2008 edition

    The information contained in this document has not been submitted to any formal IBM test and is distributed on an as is basis without

    any warranty either express or implied. The use of this information or the implementation of any of these techniques is a customer

    responsibility and depends on the customers ability to evaluate and integrate them into the customers operational environment. While

    each item may have been reviewed by IBM for accuracy in a specific situation, there is no guarantee that the same or similar results will

    result elsewhere. Customers attempting to adapt these techniques to their own environments do so at their own risk.

    Copyright International Business Machines Corporation 1997, 2008. All rights reserved.

    This document may not be reproduced in whole or in part without the prior written permission of IBM.Note to U.S. Government Users Documentation related to restricted rights Use, duplication or disclosure is subject to restrictions

    set forth in GSA ADP Schedule Contract with IBM Corp.

    Trademarks

    The reader should recognize that the following terms, which appear in the content of this

    training document, are official trademarks of IBM or other companies:

    IBM is a registered trademark of International Business Machines Corporation.

    The following are trademarks of International Business Machines Corporation in the United

    States, or other countries, or both:

    VMware and the VMware "boxes" logo and design, Virtual SMP and VMotion are

    registered trademarks or trademarks (the "Marks") of VMware, Inc. in the United States

    and/or other jurisdictions.

    Alerts is a registered trademark of Alphablox Corporation in the United States, other

    countries, or both.

    PS/2 is a trademark or registered trademark of Lenovo in the United States, other

    countries, or both.

    PostScript is either a registered trademark or a trademark of Adobe Systems Incorporated

    in the United States, and/or other countries.

    Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the

    United States, other countries, or both.

    Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other

    countries, or both.

    AIX AIX 5L AIX 6 (logo)

    AS/400 CICS/6000 DB2

    Domino HACMP iSeries

    Language Environment Lotus Magstar

    MVS Network Station Notes

    OS/2 POWER POWER4

    POWER5 POWER6 PowerPC

    pSeries Requisite RISC System/6000

    RS/6000 SecureWay SPSystem p System/370 System Storage

    Tivoli 400

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    3/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    iii AIX System Administration I Copyright IBM Corp. 1997, 2008

    Intel is a trademark or registered trademark of Intel Corporation or its subsidiaries in the

    United States and other countries.

    UNIX is a registered trademark of The Open Group in the United States and other

    countries.

    Linux is a registered trademark of Linus Torvalds in the United States, other countries, or

    both.

    Other company, product, or service names may be trademarks or service marks of others.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    4/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    iv AIX System Administration I Copyright IBM Corp. 1997, 2008

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    5/154

    Student Exercises

    4.1

    OC

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Contents v

    Contents

    Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix

    Exercises description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi

    Exercise 1. root login methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Part 1 - Direct logins to root . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2

    Part 2 - Using the su command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4

    Exercise 2. Using SMIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1Part 1 - Using SMIT (ASCII interface) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2

    Part 2 - (Optional) Using SMIT (Motif interface). . . . . . . . . . . . . . . . . . . . . . . . 2-4

    Exercise 3. System startup and shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1Part 1 - Multi-User mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2

    Part 2 - Boot using System Management Services . . . . . . . . . . . . . . . . . . . . . 3-2Part 3 - System Resource Controller (SRC) . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3

    Exercise 4. AIX software installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1Part 1 - List and install AIX software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3

    Part 2 - Working with AIX Fixes (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4

    Exercise 5. AIX 6.1 installation and configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1

    Exercise 6. Web-based System Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1

    Part 1: Use the Web-based System Manager . . . . . . . . . . . . . . . . . . . . . . . . . 6-2Part 2 (Optional): Configure the Web-based System Manager for AIX client access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3

    Part 3 (Optional): Configure the Web-based System Manager for remote client

    access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5

    Exercise 7. Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1Part 1 - List device configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2

    Part 2 - List and change system parameters . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3

    Part 3 - Removing and redefining a network adapter device . . . . . . . . . . . . . . 7-4

    Part 4 - Changing the status of a disk drive device . . . . . . . . . . . . . . . . . . . . . 7-5Part 5 - Configure a tape device (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6

    Exercise 8. LVM commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1

    Exercise 9. Working with LVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1Part 1 - Adding and removing a disk from a volume group . . . . . . . . . . . . . . . 9-2

    Part 2 - Creating and removing a volume group . . . . . . . . . . . . . . . . . . . . . . . 9-3

    Part 3 - Exploring your storage environment . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    6/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    vi AIX System Administration I Copyright IBM Corp. 1997, 2008

    Part 4 - Adding a volume group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6

    Part 5 - Adding a logical volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6

    Exercise 10. Working with file systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-1Part 1 - Inodes and NBPI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2

    Part 2 - Creating a journaled file system . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3

    Part 3 - Changing the file system size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5

    Part 4 - Reducing the size of a file system . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6

    Part 5 - Removing a file system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-7

    Part 6 - Working with mirrors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-8

    Exercise 11. Managing file systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-1Part 1 - Determining file system usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-3

    Part 2 - Using fragments for disk usage efficiency . . . . . . . . . . . . . . . . . . . . . 11-4

    Part 3 - Using JFS compression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-6

    Part 4 - Fixing file system problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-8

    Part 5 - Optional exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-9

    Exercise 12. Paging space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-1

    Exercise 13. Usingbackup and restore . . . . . . . . . . . . . . . . . 13-1Part 1 - Use SMIT to backup a non-rootvg volume group . . . . . . . . . . . . . . . . 13-3

    Part 2 - Prepare file system for backup/restore . . . . . . . . . . . . . . . . . . . . . . . 13-4

    Part 3 - Backup and restore by inode (file system) . . . . . . . . . . . . . . . . . . . . . 13-5

    Part 4 - Backup and restore by name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-8

    Part 5 - (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-9

    Exercise 14. (Optional) Using tar and cpio . . . . . . . . . . . . . . . . 14-1Part 1 - Using tar. . . . . . . . . . . . . . . . . . . . . . . . . 14-2

    Part 2 - Using cpio (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-4

    Exercise 15. Security files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-1Part 1 - Security control files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-2

    Part 2 - SUID and sticky bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-3

    Exercise 16. User administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-1Part 1: User administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-2

    Part 2 - Group administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-4Part 3 - Customizing the default .profile file . . . . . . . . . . . . . . . . . . . . . . . . . . 16-5

    Part 4 - Removing users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-5

    Part 5 - Communicating with users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-7

    Part 6 - Examine the security set up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-8

    Part 7 - Customizing the login herald . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-9

    Exercise 17. Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-1

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    7/154

    Student Exercises

    4.1

    OC

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Contents vii

    Part 1 - Using at . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-2

    Part 2 - Using batch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-4

    Part 3 - Using crontab Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-4

    Part 4 - Optional . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-6

    Exercise 18. Printers and queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-1Part 1 - Add a local printer and a queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-2

    Part 2 - Add a file device queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-3

    Part 3 - Check the queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-4

    Part 4 - Change the characteristics of a queue . . . . . . . . . . . . . . . . . . . . . . . 18-5

    Part 5 - Manage jobs in queues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-6

    Part 6 - Add a remote print queue (optional) . . . . . . . . . . . . . . . . . . . . . . . . . 18-7

    Exercise 19. Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-1Part 1 - Deconfigure TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-2

    Part 2 - Configure TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-3

    Part 3 - Testing the configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-3

    Part 4 - Using telnet. . . . . . . . . . . . . . . . . . . . . . . . 19-5Part 5 - Using ftp . . . . . . . . . . . . . . . . . . . . . . . . . 19-6

    Appendix A. Optional exercise: AIX 5L V5.3 installation . . . . . . . . . . . . . . . . . . . A-1

    Appendix B. Serial devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1Part 1 - Verify a terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-2

    Part 2 - Remove a terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-3

    Part 3 - Add a terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-4

    Part 4 - Check terminal communications settings . . . . . . . . . . . . . . . . . . . . . . B-5

    Part 5 - Change terminal characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-6Part 6 - Fixing a hung terminal (optional). . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-7

    Appendix C. Optional exercise: The System V print subsystem. . . . . . . . . . . . . C-1Part 1 - Switch print subsystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-2

    Part 2 - Add a System V printer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-2

    Part 3 - Submit print jobs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-6

    Part 4 - (Optional) Configure a remote print server and client . . . . . . . . . . . . . C-8

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    8/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    viii AIX System Administration I Copyright IBM Corp. 1997, 2008

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    9/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Trademarks ix

    4.1

    MK Trademarks

    The reader should recognize that the following terms, which appear in the content of this

    training document, are official trademarks of IBM or other companies:

    IBM is a registered trademark of International Business Machines Corporation.

    The following are trademarks of International Business Machines Corporation in the United

    States, or other countries, or both:

    VMware and the VMware "boxes" logo and design, Virtual SMP and VMotion are

    registered trademarks or trademarks (the "Marks") of VMware, Inc. in the United States

    and/or other jurisdictions.

    Alerts is a registered trademark of Alphablox Corporation in the United States, other

    countries, or both.

    PS/2 is a trademark or registered trademark of Lenovo in the United States, other

    countries, or both.

    PostScript is either a registered trademark or a trademark of Adobe Systems Incorporated

    in the United States, and/or other countries.

    Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the

    United States, other countries, or both.

    Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other

    countries, or both.

    Intel is a trademark or registered trademark of Intel Corporation or its subsidiaries in the

    United States and other countries.

    UNIX is a registered trademark of The Open Group in the United States and other

    countries.

    Linux is a registered trademark of Linus Torvalds in the United States, other countries, or

    both.

    Other company, product, or service names may be trademarks or service marks of others.

    AIX AIX 5L AIX 6 (logo)

    AS/400 CICS/6000 DB2

    Domino HACMP iSeries

    Language Environment Lotus Magstar

    MVS Network Station Notes

    OS/2 POWER POWER4

    POWER5 POWER6 PowerPC

    pSeries Requisite RISC System/6000

    RS/6000 SecureWay SP

    System p System/370 System Storage

    Tivoli 400

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    10/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    x AIX System Administration I Copyright IBM Corp. 1997, 2008

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    11/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercises description xi

    4.1

    ef Exercises description

    Exercise Instructions This section contains what it is you are to

    accomplish. There are no definitive details on how to perform the

    tasks. You are given the opportunity to work through the exercise

    given what you learned in the unit presentation, utilizing the unitStudent Notebook, your past experience and maybe a little intuition.

    Exercise Instructions With Hints This section is an exact

    duplicate of the Exercise Instructions section except that in addition,

    specific details and/or hints are provided to help step you through the

    exercise. A combination of using the Instructions section along with

    Instructions With Hints section can make for a rewarding combination

    providing you with no hints when you don't want them and hints when

    you need them.

    Optional Exercises This section gives you additional exercises to

    perform relating to the unit of discussion. It is strictly optional and

    should be performed when you have completed the required

    exercises. The required exercises pertain to the most pertinent

    information provided in the unit. This section may help round out the

    hands-on experience for a related unit.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    12/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    xii AIX System Administration I Copyright IBM Corp. 1997, 2008

    Text highlighting

    The following text highlighting conventions are used throughout this book:

    Bold Identifies file names, file paths, directories, user names and

    principals.

    Italics Identifies links to Web sites, publication titles, and is used

    where the word or phrase is meant to stand out from thesurrounding text.

    Monospace Identifies attributes, variables, file listings, SMIT menus, code

    examples of text similar to what you might see displayed,

    examples of portions of program code similar to what you might

    write as a programmer, and messages from the system.

    Monospace bold Identifies commands, daemons, menu paths and what the userwould enter in examples of commands and SMIT menus.

    The text between the < and > symbols identifies information theuser must supply. The text may be normal highlighting, bold or

    monospace, ormonospace bolddepending on the context.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    13/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 1. root login methods 1-1

    4.1

    Xempty Exercise 1. root login methods

    What this exercise is about

    In this exercise, you look at several ways to invoke the privileges of the

    root user.

    What you should be able to do

    After completing this exercise, students should be able to:

    Directly log in as root

    Use the su command to log in as root

    Introduction

    Typically the system administrator should not use root as their normal

    login account. Instead, they should use the su command to becomeroot for a short period of time to do administrative tasks.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    14/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    1-2 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Exercise Instructions

    Preface

    Two versions of these instructions are available; one with hints and one without. You can

    use either version to complete this exercise. Also, please dont hesitate to ask the instructor

    if you have questions.

    All exercises of this chapter depend on the availability of specific equipment in your

    classroom.

    If your lab environment uses remote System p platforms, the instructor provide you with

    instructions for accessing the remote environment. For example, this may involve using a

    Web browser to access a Web server which provides access to a virtual private network

    (VPN) or it may involve using a toll that extends a remote VPN to your desktop machine.

    Once you have access to the remote environment you can choose a tool to connect to your

    assigned machine. Once again, your instructor provides you with the addressing (IP

    address or hostname) and instructions for accessing the remote machine. Your network

    utility may be a telnet client, an X-Windows server, or a VNC client. Whatever tool you are

    using, at various points in the labs, you may need to re-launch your remote access tool to

    obtain a new login prompt.

    If you are using an ascii based network client, such as PuTTY, be sure to specify the telnet

    protocol in addition to providing the IP address of your assigned lab system. You may also

    want to customize the terminal emulation, such as configuring the keyboard mapping to

    generate when the backspace key is pressed. You might also wish to adjust the

    window appearance characteristics such as the font size. If you did not customize before

    launching the terminal emulation, you can make the changes later by right clicking on thetitle bar and selecting change settings.

    If you are using a VNC viewer (to access CDE environment), you need to enter (when

    prompted) the IP address of your assigned lab system, immediately followed by :#, where

    # is the port number for the vncserver. For example: 192.168.22.5:1.

    Part 1 - Direct logins to root

    __ 1. Establish connectivity to the remote lab environment. (If you are using local

    non-partitioned machines, you only need to turn on the local attached terminal andskip to step 3).

    __ 2. Select and launch a network utility to access your assigned lab system.

    __ 3. Log in as the user root. The password is ibmaix.

    __ 4. Open a terminal. (if necessary)

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    15/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 1. root login methods 1-3

    4.1

    Xempty __ 5. Determine your current directory and your home directory.

    Current directory: ________/__

    Home directory: ________/__

    __ 6. To verify that you do, in fact, have root privileges, cat out the file/etc/security/passwd. This file holds the encrypted passwords for the users on your

    system. Only root can look at this file. More details on this file are mentioned later in

    the course. Did you see the contents of the file? __________

    __ 7. Log out of the system.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    16/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    1-4 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Part 2 - Using the su command

    __ 8. Log into the system using the login name team01 and the password team01.

    __ 9. Open a terminal. (if necessary)

    __ 10. Determine your current directory and your home directory.

    Current directory: __________

    Home directory: __________

    __ 11. Check to see if you have the authority to view /etc/security/passwd.

    Did you see the contents of the file? __________

    __ 12. Change to the /tmp directory.

    __ 13. Now, switch user to root without using the - (dash) option.

    __ 14. Determine your current directory and your home directory.

    Current directory: __________

    Home directory: __________

    Has anything changed? _____________________________________________

    __ 15. Do you have root privileges? Check /etc/security/passwd. _________

    __ 16. Change to the /etc directory.

    __ 17. Exit back to team01.

    __ 18. Did the su and the cdto /etc (in the resulting subshell) affect the current directoryafter exiting the subshell? ______

    __ 19. Now, try using the su command with the - (dash) option. What is your homedirectory? If you're not sure, check before performing the su. .

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    17/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 1. root login methods 1-5

    4.1

    Xempty __ 20. Determine your current directory and your home directory.

    Current directory: _____/_____

    Home directory: _____/_____

    Is there any thing different this time?

    __ 21. Check /etc/security/passwd to make sure you have root privileges.

    __ 22. Exit back to team01 and log out.

    End of exercise

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    18/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    1-6 AIX System Administration I Copyright IBM Corp. 1997, 2008

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    19/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 2. Using SMIT 2-1

    4.1

    Xempty Exercise 2. Using SMIT

    What this exercise is about

    AIX provides several different interfaces; ASCII (command-line),

    Common Desktop Environment (CDE) and X-Window (Motif). Thisexercise provides an opportunity to use the ASCII interface to the

    System Management Interface Tool (SMIT). Optionally, you can also

    use CDE and Motif interface to SMIT.

    What you should be able to do

    After completing this exercise, students should be able to:

    Log in from the ASCII interface

    Start SMIT (ASCII and optionally the graphical version) Add users with default settings

    Navigate through the SMIT menus

    Use SMIT function keys

    Display the SMIT history files, smit.log, and smit.script

    Start and use graphical SMIT

    Introduction

    This exercise is designed to give you experience working with the

    system management tools supplied with AIX. In most classrooms,there are two students per AIX system. In many cases, only one

    person is able to perform the task at a time. You need to work together

    with your teammate. Be sure to take turns at the keyboard.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    20/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    2-2 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Exercise Instructions

    Preface

    Two versions of these instructions are available; one with hints and one without. You can

    use either version to complete this exercise. Also, please dont hesitate to ask the instructor

    if you have questions.

    Note that on some terminal emulations, the function keys are not operative and you may

    need to substitute escape sequences. For example, instead of pressing F3, you might

    need to press for the same function.

    All exercises of this chapter depend on the availability of specific equipment in your

    classroom.

    Part 1 - Using SMIT (ASCII interface)

    __ 1. Log in as the user root. The password is ibmaix.

    __ 2. Open a terminal. (if necessary)

    __ 3. Start SMIT in ASCII mode.

    __ 4. Add five users to the system. They should be named team100 through team104.

    Take all of the defaults. Customizing the attributes is covered later in the course.

    Assign a password for each user that is the same as the user name. When the fiveusers and their passwords have been entered, exit from SMIT.

    __ 5. Start SMIT using the options to redirect the smit.script and smit.log files to the

    /home/team100 directory. From the main SMIT menu, select Processes &

    Subsystems. Display all the current process running on your system. Examine the

    output.

    Which command do you think was executed? _______.

    How can you find out? ___________________________________________ Return to the main menu.

    __ 6. In a similar manner, select each of the main SMIT menu entries, examine the

    submenu, then use the F3 key to back up to the previous menu. Do not executeany commands that may cause changes to the system. Because you are logged

    in as root, you must be very careful.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    21/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 2. Using SMIT 2-3

    4.1

    Xempty

    __ 7. Shell out (F9) and execute the date command. Return to SMIT and do the following:

    1) Stop syslogd subsystem.

    2) View the command that was executed.

    3) List ALL subsystems to see that syslogd is inoperative.

    4) Restart syslogd.

    5) Continue to the next step. Do not press F3 or exit SMIT.

    __ 8. You should have the COMMAND STATUS screen displayed. Capture an image of

    this screen. Exit SMIT.

    __ 9. Look at the SMIT history files usingpg ormore. Look for the image you captured in

    the previous step. What information is in each of these files? ____________________________

    _____________________________________________________________

    Why should these files be monitored?

    _____________________________________________________________

    __ 10. Look at the ownership of the SMIT history files of user team100 with ls -al.

    Was it a good idea to create these files as root? ____ What will happen if user team100 will use SMIT?

    _____________________________________________________________

    __ 11. As the system administrator, you can select the default interface that the users can

    use. Depending on your classroom environment, you may be able to set a different

    interface. Ask your instructor if you would like to change the interface. For the new

    interface to take effect, you need to reboot your system. Log out when you are done.

    Note

    If you are using VNC for remote graphics, do not change the system user interface

    in this step; your VNC server is configured to only work with a CDE user interface.

    __ 12. If you did not change your System User Interface (and thus did not need to reboot),

    terminate smit and log off of your system.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    22/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    2-4 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Part 2 - (Optional) Using SMIT (Motif interface)

    __ 13. If using CDE, log into CDE desktop as root and the password ibmaix.

    If using an X-Windows environment, log in to the AIX system from the ASCII

    interface as root and the password ibmaix.

    __ 14. If necessary, open a terminal window. If one already exists, skip to the next step.

    __ 15. Add five users to the system. They should be named team200 through team204.

    Take all the defaults. Do not assign passwords for these users. When the five

    users have been entered, exit from SMIT.

    __ 16. In a similar manner, select each of the main SMIT menu entries, examine the

    submenu, and then use the Cancel button to go back to the previous menu. Do not

    execute any commands that may cause changes to the system. Because you

    are logged in as root, you must be very careful.

    __ 17. Exit from SMIT. Look at the SMIT history files withpg ormore.

    What information is in each of these files?

    _____________________________________________________________

    Why should these files be monitored?

    _____________________________________________________________

    __ 18. Log out of CDE or X-Windows.

    __ 19. Log out of the system.

    End of exercise

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    23/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 3. System startup and shutdown 3-1

    4.1

    Xempty Exercise 3. System startup and shutdown

    What this exercise is about

    This exercise familiarizes you with the system startup and shutdown

    process, and using the System Resource Controller (SRC).

    What you should be able to do

    After completing this exercise, students should be able to:

    Start a System p in multi-user

    Switch to the root user and shutdown the system

    Execute the lssrc, stopsrc, and startsrc commands

    Introduction

    If there are two or more students per system, you must work as a

    single team throughout this exercise. All instructions involve using the

    system unit for starting and stopping the system in various modes.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    24/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    3-2 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Exercise Instructions

    Preface

    Two versions of these instructions are available; one with hints and one without. You

    can use either version to complete this exercise. Also, please dont hesitate to ask the

    instructor if you have questions.

    All exercises of this chapter depend on the availability of specific equipment in your

    classroom.

    Part 1 - Multi-User mode

    __ 1. Log in using the user name and password provided by your instructor. The login

    name should be a user name such as teamxx where xx is a double digit number like

    01, 02, and so forth. Switch to the root user. Display the alog file for the bootlog.

    Page through the output to see what devices were configured and the other tasks

    that were performed.

    Note

    If this is the first time you log in using the user name, you are prompted to change

    your password. Keep it the same as the user name.

    __ 2. Page out the /etc/inittab file. Take a moment to become familiar with its contents.

    What is the run level of shdaemon? _______

    What does it mean? ___________________________________

    __ 3. Log out of this session.

    Part 2 - Boot using System Management Services

    __ 4. If your remote AIX system is an LPAR on a remote managed system, then you can

    do this SMS exercise by remotely accessing the HMC using your Web browser and

    starting a virtual console session with your AIX system (the Web browser must haveconnectivity to the HMC which may be inside a virtual private network (VPN).

    __ 5. In order to boot to an SMS mode, you must first shutdown the AIX system. From the

    command line, request a shutdown with no delay and no reboot.

    __ 6. Access your systems HMC by starting a Web browser and using the HMCs IP

    address as the URL. If you do not have this IP address, ask your instructor. (If you

    are on a stand-alone system, skip to Step 4 below for booting in SMS mode.)

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    25/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 3. System startup and shutdown 3-3

    4.1

    Xempty __ 7. Start the Hardware Management Console application by clicking the Launch link.

    Log into your system HMC as hscroot. and password abc1234. Locate your

    machine and the logical partition which your are assigned.

    __ 8. Locate the icon for your partition. The state of the partition should be not active.

    Activate the partition, specifying that you want to open a terminal window and that

    you want a boot mode of SMS.

    __ 9. If you are using a local non-partitioned system (otherwise skip to the next step): As

    the root user, shut down and reboot the system to the System Management

    Services mode. As soon as you see the keyboard and hear a beep, you should

    press the numeric 1 key or key to access SMS.

    __ 10. System Management Services (SMS) menus and contents vary from one System p

    machine/model to another. Take a few moments to explore the menu options which

    display on your system. Do not make any changes or run any tests. Also, dont clickExiton the main SMS screen until you are finished exploring the other options.

    __ 11. When you are done exploring, exit the SMS program and allow the system to reboot

    in multi-user mode.

    Part 3 - System Resource Controller (SRC)

    __ 12. Log in as root. List the active and inoperative subsystems on your system. Display a

    screen at a time. Locate the syslogdsubsystem. It should be marked as active.

    __ 13. Using the appropriate SRC commands, stop the syslogdsubsystem. Check that itis inoperative. Restart it. Check that it is active.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    26/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    3-4 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Part 4 - Resetting the run level (INIT)

    __ 14. Shutting a system down to Single User mode removes any TCP/IP network access

    to the system. Due to this, you need to use the system console while doing this lab

    exercise.

    If you are using a non-partitioned local system, then login at the attached console

    and skip to step 18.If you are using a partitioned system, you need to start a virtual terminal to your

    partition, as you did earlier when booting to SMS mode. Do the following steps:

    __ 15. Access your systems HMC by starting a Web browser and using the HMCs IP

    address as the URL. If you do not have this IP address, ask your instructor. (If you

    are on a stand-alone system, skip to Step 4 below for booting in SMS mode.)

    __ 16. Start the Hardware Management Console application by clicking the Launch link.

    Log into your system HMC as hscroot. and password abc1234. Locate your

    machine and the logical partition which your are assigned.

    __ 17. Start a virtual console window for your assigned partition. This acts as your system

    console during the exercise.

    __ 18. Reset the run level to Single User Mode without rebooting the system.

    __ 19. Verify that several subsystems have been stopped.

    __ 20. Verify that there are few processes running on the system.

    __ 21. Run /etc/rc.net to start the network interfaces and then reset the Run Level toMulti-User Mode.

    __ 22. Ensure that all normal subsystems have been started and are working properly. If

    you have been using CDE, and CDE fails/hangs now, you forgot to run /etc/rc.netin the previous step.

    __ 23. Shut down and reboot the system one more time.

    End of exercise

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    27/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 4. AIX software installation 4-1

    4.1

    Xempty Exercise 4. AIX software installation

    What this exercise is about

    In this exercise, you list the software currently installed on the AIX

    system. You then install two software packages.

    What you should be able to do

    List the software installed on an AIX system

    Install software

    Install software fixes (optional)

    View the history of installed software (optional)

    Introduction

    This exercise is designed to give you experience working with the

    installation facilities supplied with AIX. If there is more than one

    student sharing a system, then only one person can actually perform

    these steps. All other students on that system should observe while

    the steps are being done.

    In this exercise, you install two software packages:

    bos.dosutil bos.games

    In this exercise, you may also install a fix to already installed software

    packages.

    The instructions are written assuming you are using SMIT in ASCII

    mode. However, it is easy to interpret the instructions so that they can

    be used with SMIT in the AIXWindows environment. Feel free to use

    SMIT in either mode.

    When you select an item while using the ASCII user interface, use the

    cursor keys on the keyboard to highlight a menu item, then press

    Enter. On a graphics display, choose (that is, click) the selected itemwith the left mouse button.

    The fix installation and display of the fix history is optional. It requires

    that the lab setup for the exercises used an AIX 5L V5.3 TL6 base

    installation. If the image used in your lab environment has additional

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    28/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    4-2 AIX System Administration I Copyright IBM Corp. 1997, 2008

    maintenance already installed and committed, you may not be able to

    successfully complete the optional steps.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    29/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 4. AIX software installation 4-3

    4.1

    Xempty Exercise Instructions

    Preface

    Two versions of these instructions are available; one with hints and one without. You

    can use either version to complete this exercise. Also, please dont hesitate to ask the

    instructor if you have questions.

    All exercises of this chapter depend on the availability of specific equipment in your

    classroom.

    Part 1 - List and install AIX software

    __ 1. Access your system. If remote, we recommend an interactive ascii prompt via telnet,

    but CDE graphical session can also work.

    __ 1. Log in to AIX as teamxxand su to root.

    __ 2. Use SMIT to list the software on your system.

    What command is SMIT executing to provide this information?___________

    Examine the output and verify that bos.games and bos.dosutil are not installed

    on your system.

    __ 3. Now it is time to install the two software packages, bos.dosutil and bos.games:

    These packages have been preloaded (but not installed) in a directory called

    /usr/sys/inst.images. The procedure to install these packages from this directory

    are the same as those to install software from CD or tape.

    Use SMIT to install the bos.games and bos.dosutil packages. When this task has

    successfully completed, return to the AIX command line.

    __ 4. Verify that the bos.games fileset installed correctly and list the games which are

    available.

    __ 5. Use SMIT to remove the bos.dosutil fileset.

    __ 6. If not doing the optional Part 2 - Working with AIX Fixes, log off the system at this

    point.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    30/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    4-4 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Part 2 - Working with AIX Fixes (Optional)

    __ 7. We have already downloaded AIX 5.3 TL6 Service Pack 1 and stored the fix files in

    the /usr/sys/inst.images/fixes directory. Use SMIT to run a Comparison Report

    between this fix repository and what is currently installed on your system. Only

    report on installed software that is at a lower level than what is in the fix repository.

    Briefly examine the generated report. Can you tell what problems or new capabilities

    are included in which fileset update? ________________________________

    __ 8. Return to the Software Installation and Maintenance menu and choose the menu

    sequence which allows you to list software that is on installation media (which could

    be a directory). List the APARs that are addressed by the filesets in the

    /usr/sys/inst.images/fixes directory. Briefly examine the output.

    __ 9. Return to the Software Installation and Maintenance menu and follow a menusequence that presents a dialogue panel which allows you to install a fix by

    specifying the related APAR number. Request to use our /usr/sys/inst.images/fixes

    directory as the source of the fixes.

    __ 10. There is a bug in AIX 5L V5.3 TL6 where the usrck command can (incorrectly) lockall user accounts. You do not want that to happen. In the dialogue panel, get a listing

    of APARs which are available to be installed. Find the APAR which was just

    described. Select and install that fix. Examine the output to verify that the fix was

    installed. What filesets have been installed?______________________________________________________________

    ______________________________________________________________

    __ 11. View the history of the installed filesets using the lslpp command.

    __ 12. Log off from the system.

    End of exercise

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    31/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 5. AIX 6.1 installation and configuration 5-1

    4.1

    Xempty Exercise 5. AIX 6.1 installation and configuration

    What this exercise is about

    In this exercise, you have the opportunity to migrate your AIX OS

    image from AIX V5.3 to AIX 6.1, and work with the ConfigurationAssistant. The Configuration Assistant is an application that can be

    used to configure the initial system settings.

    What you should be able to do

    After completing this exercise, students should be able to:

    Install an Operation System by migrating to AIX 6.1

    Use the Configuration Assistant

    Introduction

    The Hardware Management Console (HMC) and Configuration

    Assistant are graphics-based applications that assist the system

    administrator with various tasks. These applications are used to

    perform the installation of the operating system and system

    configuration respectively.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    32/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    5-2 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Exercise Instructions

    Preface

    Two versions of these instructions are available; one with hints and one without. You

    can use either version to complete this exercise. Also, please dont hesitate to ask the

    instructor if you have questions.

    All exercises of this chapter depend on the availability of specific equipment in your

    classroom.

    The objective for the first part of this lab is to install an IBM AIX 6.1 mksysb image. The

    instructions to accomplish this using an eLab environment and a stand-alone system is

    listed. Ask your instructor to confirm that the /spot and lppsource (bos) have been

    allocated for your system before starting.

    __ 1. Log in to your assigned system.

    __ 2. Before you start the migration/install, you need to identify the boot disk and the

    adapter which has a configured interface. Use thebootlist -o command toidentify the boot disk. Use the netstat -in and the lsfg commands to obtain thelocation of the configured interfaces adapter. If the configured interface is en4, then

    the related adapter is ent4 (the number in both names will always match). You only

    need the last two positions of the location code (either C#-T# or P#-T#)). You cover

    location codes in more detail in the Device unit later in the course.

    boot disk: __________________________________________________

    configured interface and IP address ______________________________

    location code of the network adapter _____________________________

    __ 3. If you do not already have a working HMC window, access your systems HMC by

    starting a Web browser and using the HMCs IP address as the URL. If you do not

    have this IP address, ask your instructor.

    If you are not using a HMC, log on to your stand-alone system and skip to Step 3.

    __ 4. If you are not already logged into the HMC, start the Hardware Management

    Console application by clicking the Launch link. Log into your system HMC as

    hscroot. and password abc1234.

    __ 5. Locate your machine and the logical partition which your are assigned.

    __ 6. Shutdown your assigned lpar, This can be performed using the HMC (Operating

    System options only) or by using the shutdown command at an interactive rootuser prompt.

    __ 7. If you currently have a virtual terminal open, close that window.

    __ 8. Boot your system in SMS mode. Open a console session if you are using a lpar

    system and HMC configuration.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    33/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 5. AIX 6.1 installation and configuration 5-3

    4.1

    Xempty __ 9. Configure your system Remote IPL parameters. You need the correct subnet mask,

    plus the IP addresses of the NIM server and the gateway. These must be configured

    to boot off the network adapter. The instructor provides you with the NIM and

    gateway addresses.

    NIM server IP address: _______________________________________

    Gateway IP address: _________________________________________

    __ 10. Assign your network adapter as the first and only boot device. Be sure the location

    of the adapter matches what you recorded earlier.

    __ 11. Your system should be downloading an AIX network boot image at this time. The

    download and execution of the network boot image takes 2 to 3 minutes. When

    done, you see a prompt; select the terminal console and the English during

    installation.

    __ 12. On the Main Installation and Maintenance menu, select Change/Show Setting and

    Install.

    __ 13. Verify that the Method of Installation is set to Migration and the Disk to Install is

    the one you previously identified as the boot disk (probably hdisk0). When verified,

    enter 0 to start the installation.

    __ 14. You may get prompted once or twice for other verifications. For example, it may give

    you the option of listing filesets and configuration files that are replaced. You may

    choose to examine these; the lists are not very large. Eventually respond with a 0 to

    continue with the migration.

    When you see the Installing Base Operation System, you can take a break (though

    the instructor may wish to use this time to discuss another topic).

    This takes 30 to 40 minutes.

    __ 15. Once the install is complete, the system automatically reboots. Once the reboot is

    completed, there will be a login prompt on the system console. At that point,

    continue to the next step.

    __ 16. Log in as root user and start the Configuration Assistant.

    __ 17. Ensure the date and time are set correctly.

    __ 18. Familiarize yourself with some of the other options. When youve finished, exit from

    Configuration Assistant and select the option to Finish now, and do not restart

    Configuration Assistant when restarting AIX.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    34/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    5-4 AIX System Administration I Copyright IBM Corp. 1997, 2008

    End of exercise

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    35/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 6. Web-based System Manager 6-1

    4.1

    Xempty Exercise 6. Web-based System Manager

    What this exercise is about

    This exercise provides an opportunity to use the Web-based System

    Manager. If your classroom is networked, there is an optional part toallow you to configure your server for Web-based System Manager

    client access.

    What you should be able to do

    At the end of the lab, you should be able to:

    Use the Web-based System Manager

    Configure the Web-based System Manager for client machine

    access Use the Web-based System Manager from the client machine

    using the WebSM client application

    Introduction

    This exercise is designed to give you experience working with the

    Web-based System Manager in AIX. If you are sharing the machine,

    only one person should perform each step. You must work from a

    graphical interface for this exercise.

    If your classroom is networked, you can configure and test the

    Web-based System Manager for client machine access. The client

    machine can be another AIX system or a PC. In both cases, the client

    platform must have a browser that is Java-enabled.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    36/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    6-2 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Exercise Instructions

    Preface

    Two versions of these instructions are available; one with hints and one without. You

    can use either version to complete this exercise. Also, please dont hesitate to ask the

    instructor if you have questions.

    All exercises of this chapter depend on the availability of specific equipment in your

    classroom.

    If there are multiple interfaces on your system, your instructor should identify which

    interface to use for this exercise. If you are in an environment where the AIX system is

    accessed remotely, be sure to not deconfigure the interface used for that purpose.

    Part 1: Use the Web-based System Manager

    __ 1. For this exercise you need a graphic interface to your system.

    If you are using a partitioned system, then you need to use a remote graphics utility

    such as VNC or an Xwindows Server utility to access your system. You should be

    presented with a CDE login prompt.

    If you are using a local non-partitioned system you need to use the attached graphic

    console.

    __ 1. Log in as root.

    __ 2. If you logged using a locally attached graphic console on a non-partitioned system,then make sure you are in the AIX windows or CDE environment.

    __ 3. If you are in a CDE environment and there is no terminal emulation window, open

    the Personal Application subpanel (arrow over the pencil and paper icon) and click

    on the Terminal icon.

    Access the Web-based System Manager.

    __ 4. View system processes by both details and tree details. Viewing processes by tree

    detail provides a pictorial view of the parent/child relationship of the processes.

    Return to the view of the task icons for Processes when you have completed this

    task.

    __ 5. View the Web-based System Manager window that displays the current system date

    and time.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    37/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 6. Web-based System Manager 6-3

    4.1

    Xempty __ 6. Close the Web-based System Manager Launch Pad window and log out of the

    system.

    Part 2 (Optional): Configure the Web-based System Managerfor AIX client access

    Preface

    For the optional sections, you need to have a functioning network environment in lab

    room. The lab teams need to pair up and work together. Each team pair select which

    machine is remotely managed (Web-based System Manager server) and which

    machines are the remote system administrator platform (Web-based System Manager

    client).

    There is no need for additional configuration to use the Web-based System Manager to

    manage an AIX platform from an AIX client with the Web-based System Manager

    installed. Client-server mode does not require that the server run a Web server; the

    connection is made directly between the two Web-based System Manager applications.

    __ 7. Log into the WebSM Client system as root and using the correct root password.

    __ 8. On the WebSM Client system, make sure you are in the AIX windows or CDE

    environment. If you are in a CDE environment and there is no terminal emulation

    window, open the Personal Application subpanel (arrow over the pencil and paper

    icon) and click the Terminal icon.

    Access the Web-Based System Manager on the client platform, but specify the IP

    address or hostname of the Web-based System Manager server machine.

    __ 9. Do a couple things to validate that the interface is working correctly and then close

    down the application.

    __ 10. At the Web-based System Manager server system, disable client-server (and

    remote client) access. This way you can use the Web-based System Manager

    locally on a platform but not allow remote client-server access.

    __ 11. At the client platform, again start the Web-based System Manager specifying the IP

    address or hostname of the Web-based System Manager server machine. Did it

    work? _____

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    38/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    6-4 AIX System Administration I Copyright IBM Corp. 1997, 2008

    __ 12. At the Web-based System Manager server platform, re-enable client-server (and

    remote client) access.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    39/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 6. Web-based System Manager 6-5

    4.1

    Xempty Part 3 (Optional): Configure the Web-based System Managerfor remote client access

    Preface

    In order to do this optional exercise, you must have a qualified PC running a supported

    version of Windows or Linux, a supported desktop environment, and a Java-capable

    Web browser. The PC must have network connectivity to the AIX server platform.

    When using a PC platform as the Web-based System Manager Remote Client, you

    must first install the Web-based System Manager remote client application on that

    platform. This is done using the Web server on the Web-based System Manager Server

    platform.

    One a PC has the WebSM Client, it can access any AIX system which has wsmserver

    enabled (as in the previous exercise part). The AIX WebSM servers do not need the

    following configuration completed, only the server that provides for Web browser-based

    download of the WebSM client package.

    The alternative to using a Web browser interface is to ftp download the install shield

    executable file to the PC. The path to that file is:

    /usr/websm/pc_client/setup.exe

    __ 13. While a Web page server is not needed to use the Web-based System Manager

    function, it is used to download the Web-based System Manager client to an remote

    Linux or Windows platforms you might wish to work from. The HTTP Server Web

    Server software (IHS2), which is delivered on the AIX 5L V5.3 Expansion Pack CD,

    should already be pre-installed on your system.

    Verify that it has been installed.

    __ 14. You need a graphic interface to configure the Web server support for providing the

    WebSM PC client. In your graphic environment start a terminal emulation window

    and execute configassist in the background.

    Configure the Web server support for Web-based System Manager using the

    following values.

    The root document directory is: /usr/HTTPServer/htdocs

    The root CGI directory is: /usr/HTTPServer/cgi-bin

    The HTTPServer start command is: /usr/HTTPServer/bin/apachectl restart

    __ 15. On the client PC, start the Web browser and enter a URL of:

    http:///remote_client.html

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    40/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    6-6 AIX System Administration I Copyright IBM Corp. 1997, 2008

    __ 16. Click the InstallShield hyperlink on the new Web page. (The Java Web Start

    method requires additional security software to be installed on both client and server

    platforms).

    __ 17. Identify the client as either a Linux or Windows platform on the resulting Web page.

    __ 18. On the File Download pop-up, click the Save to Disk button. In the Save In: field,

    navigate to store it on the desktop and again click the Save button. In the

    Download complete pop-up, click the Open button. This runs the Install Shield

    wizard. (There will be a command prompt window launch to executejava.exe just

    before the Installer window appears; do not do anything with the command prompt

    window.)

    On the Installer window, click the Next button.

    Use the default install Directory name and click the Next button. Note the location and size of the install and click the Next button.

    After the install is complete, click the Finish button.

    __ 19. You should now see an icon on your desktop labeled: Web Based System

    Manager Application.

    Open this new icon.

    In the Log On window, enter the Web-based System Manager server hostname

    or IP address and click the Log On button.

    After the handshake procedure is completed, enter root and the root password

    and again click the Log On button.

    __ 20. Once the Web System Manager window appears and has all the icons filled in, try a

    few operations to prove it is operational and then exit the application.

    End of exercise

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    41/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 7. Devices 7-1

    4.1

    Xempty Exercise 7. Devices

    What this exercise is about

    This exercise familiarizes the students with listing device configuration

    information on the system and configuring a defined device.

    What you should be able to do

    At the end of the lab, you should be able to:

    List device configuration on a system using SMIT or the

    appropriate command

    List and change system parameters

    Configure a defined SCSI device

    Introduction

    This exercise is designed for you to become familiar with the methods

    you can use to discover what devices are on your system and how

    they are configured. It deals exclusively with adapters and SCSI types

    of devices. Future optional exercises will deal with terminals and

    printers.

    Part 5 - Configuring a defined device, can only be done if you have an

    externally attached tape drive or CD-ROM. Most lab facilities do not

    have this.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    42/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    7-2 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Exercise Instructions

    Preface

    Two versions of these instructions are available; one with hints and one without. You

    can use either version to complete this exercise. Also, please dont hesitate to ask the

    instructor if you have questions.

    All exercises of this chapter depend on the availability of specific equipment in your

    classroom. If your lab environment uses remote System p/AIX platforms, the instructor

    will provide you with the addressing (IP address or hostname) and instructions for

    accessing the remote machine. For example, you might be using telnet, an X-windows

    server, or a VNC client. Whatever tool you are using, at various points in the labs you

    may need to re-launch your remote access tool to obtain a new login prompt.

    Part 1 - List device configuration

    __ 1. Log in as a regular user and obtain a command prompt. If using a graphical interface

    (ex. CDE), then start a terminal emulation window.

    __ 2. su to the root user. If more than one person is using the same system you need towork as a team.

    __ 3. List all the supported devices on the system.

    __ 4. List the configured devices on the system. Are your SCSI devices available?

    ____________________________________________________________

    __ 5. List information about the memory you have on the system. Record the amount of

    memory you have.

    __ 6. List the disks on your system. Record how many you have.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    43/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 7. Devices 7-3

    4.1

    Xempty Part 2 - List and change system parameters

    __ 7. The kernel is represented by a special logical device, sys0. This can be

    manipulated by commands or through SMIT.

    List the attributes of the kernel. The only kernel attributes that can be changed are

    those that are marked with True in the last column of output.

    Which attributes cannot be changed? ________________________________

    _________________________________________________________

    __ 8. Which attribute in the previous listing describes the number of processes a user can

    run? _______________________________________

    __ 9. By default, the system is configured so that each user can run no more than 128

    processes at once. Change this value to 150 processes per user. The new value

    takes effect immediately.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    44/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    7-4 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Part 3 - Removing and redefining a network adapter device

    Your machine must have an extra network adapter for which the corresponding

    interface is not configured. Otherwise, skip to Part 5 - Changing the status of a disk

    drive device.

    __ 10. Identify the network interfaces that are configured (for example, available) on your

    system by listing the if class of devices. Look for the names of the Standard EthernetNetwork Interfaces. Which of these interfaces are available and which ones are

    defined?

    ______________________________________________________________

    ______________________________________________________________

    __ 11. For the interfaces which are only defined, select one and list the adapter which the

    interface is using. For example, if the interface is en4, then the corresponding

    network adapter device name is ent4 (the numbers always match). What is thestatus of the adapter?

    _______________________________________________________________

    __ 12. Put the Ethernet adapter device into a Defined state. Be careful to specify the

    correct adapter and not the one with a configured interface. Display the adapter and

    verify its status.

    __ 13. Remove the Ethernet adapter from the customized database.

    __ 14. Rediscover and configure the Ethernet adapter. Check its status.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    45/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 7. Devices 7-5

    4.1

    Xempty Part 4 - Changing the status of a disk drive device

    Your machine must have a an extra disk drive to continue with this section. Otherwise,

    you are done with this exercise.

    __ 15. Determine the logical names of your disk drives and the volume group they (if any)

    that they are assigned to by using the lspv command. (We will be covering PVs and

    VGs later in the course).

    Which disks have a volume group of rootvg? ____________________________

    Which disks have a volume group of none? _____________________________

    __ 16. Generate a device listing for the disk devices. Select one disk which was not in a

    volume group and record the location of that disk. If it is SCSI attached, what is the

    SCSI ID of the disk.

    _______________________________________________________________

    _______________________________________________________________

    __ 17. Using the disk selected above, put that disk device into a Defined state.

    __ 18. Remove the disk device from the customized database.

    __ 19. Rediscover and configure that same disk for use. Does the device that appears

    have the same location? _________________________________________

    ____________________________________________________________

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    46/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    7-6 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Part 5 - Configure a tape device (optional)

    If you have an externally attached tape drive, continue with this section. Otherwise, skip

    to Part 4 - Configure a CD-ROM device.

    __ 20. Issue the shutdown command to bring your system down. If you have more than oneuser on your system, coordinate this task with the other users.

    __ 21. Turn off the tape drive. Reboot the system.

    __ 22. Log in and su to root. Check the status of the tape drive.

    Is it in a state where it can be used? ____

    Why? _______________________________

    Record the name of the tape drive.

    __ 23. Put the tape drive into the available state so it can be used. Use the name for the

    tape drive that you recorded in the previous instruction.

    End of exercise

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    47/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 8. LVM commands 8-1

    4.1

    Xempty Exercise 8. LVM commands

    What this exercise is about

    This exercise gives you a chance to look at the file system

    configuration on your machine and introduce you to some LVMcommands.

    What you should be able to do

    After completing this exercise, students should be able to:

    Display information about your file systems

    List the LVM information on your system

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    48/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    8-2 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Exercise Instructions

    Preface

    Two versions of these instructions are available; one with hints and one without. You

    can use either version to complete this exercise. Also, please dont hesitate to ask the

    instructor if you have questions.

    All exercises of this chapter depend on the availability of specific equipment in your

    classroom.

    __ 1. Log in as team01 and su to root.

    __ 2. View the contents of /etc/filesystems and list the file systems on your machine.

    __ 3. Execute the command: lsfs.

    What does it show? _____________________________________________

    __ 4. Execute the command: lsvg.

    What does it show? _____________________________________________

    __ 5. Execute the command: lspv.

    What does it show? _____________________________________________

    __ 6. Execute the command: lsvg -l rootvg.

    What does it show?

    End of exercise

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    49/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 9. Working with LVM 9-1

    4.1

    Xempty Exercise 9. Working with LVM

    What this exercise is about

    The purpose of this exercise is to give students the opportunity to work

    with the facility that manages physical and logical data storage, theLogical Volume Manager (LVM). The Systems Management Interface

    Tool (SMIT) is used extensively throughout this exercise.

    What you should be able to do

    After completing this exercise, students should be able to:

    Add and remove a disk from a volume group

    Create and remove a volume group

    List the characteristics of the system's volume groups, physical

    volumes, and logical volumes

    Add a logical volume

    Extend a logical volume

    Introduction

    In this exercise you work extensively with SMIT to work with the

    Logical Volume Manager. First, you investigate existing volumegroups, physical volumes and logical volumes. Once you are

    comfortable with the layout of your storage, you have the opportunity

    to add a physical volume to a volume group and then create a logical

    volume. Finally, you make some changes to the logical volume

    characteristics. In many cases, both the SMIT screens and the

    command are provided in the Exercise Instruction With Hints

    section. All tasks shown can also be done using the graphical version

    of SMIT.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    50/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    9-2 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Exercise Instructions

    Preface

    Two versions of these instructions are available; one with hints and one without. You

    can use either version to complete this exercise. Also, please dont hesitate to ask the

    instructor if you have questions.

    All exercises of this chapter depend on the availability of specific equipment in your

    classroom.

    Part 1 - Adding and removing a disk from a volume group

    __ 1. Log in as teamxx and switch to the root user account.

    __ 2. Ensure you have a hard disk available to create a new volume group.

    What is the name of the disk that is currently available? _______________

    __ 3. From the disk information that you determined in the step above, add a free disk into

    rootvg.

    Note

    You need to substitute your free disk name when hdiskn is referenced.

    __ 4. Check to see if the disk is now associated with rootvg.

    __ 5. Take the same disk that you added to rootvg, out of rootvg. Make sure you remove

    the correct disk.

    __ 6. Verify that the disk is no longer associated with rootvg.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    51/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 9. Working with LVM 9-3

    4.1

    Xempty Part 2 - Creating and removing a volume group

    __ 7. Using the free disk, create a new volume group called newvg.

    __ 8. Verify that the new volume group was created. What are the maximum number of physical volumes that can be added to this

    volume group? _________________________________________________

    __ 9. Convert newvg into a big volume group.

    __ 10. What is the maximum number of physical volumes that can be added to the

    converted newvg? _________________________________________________

    __ 11. Convert newvg into a scalable volume group. In order to make this change the

    volume group must first be varied offline. Vary it back online when the conversion is

    completed.

    __ 12. What is the maximum number of physical volumes that can be added to the scalable

    format newvg? _________________________________________________

    __ 13. Remove the newvg volume group.

    __ 14. Verify that hdiskn is not associated with any volume group. If it is not, repeat the

    steps above. You need to have this disk free for a later exercise.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    52/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    9-4 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Part 3 - Exploring your storage environment

    __ 15. Log in as teamxx and su to root, if not already.

    __ 16. List all of the system's volume groups. If you use SMIT, before pressing Enter for theoutput, try using the F6 key to see the command that is being built.

    __ 17. List the contents of the rootvg volume group. If you are using SMIT, for List

    OPTION use status.

    Find the information that is necessary to answer the following questions about your

    environment:

    a) How many physical volumes are there? ______________________________

    b) How many logical volumes are there? _______________________________

    c) How many total physical partitions are there for this volume group?_________

    d) How many of those physical partitions are free? ________________________

    e) How large are the physical partitions? _______________________________

    f) What is the Logical Track Group size? _______________________________

    g) What is the maximum number of PPs per physical volume? _______________

    __ 18. List the contents of the rootvg volume group once again this time selecting

    physical volumes for the List OPTION. Note: the free distribution of physical

    partitions is shown relative to the position on disk. These positions represent outer

    edge, outer middle, center, inner middle, inner edge. Make a note of the free

    partitions and their position on disk. ______ ______ ______ ______ ______

    __ 19. List all of the physical volumes on the system.

    __ 20. List the contents of any physical volume on your system. If you are using SMIT, for

    List OPTION use status.

    Find the information that is necessary to answer the following questions about your

    environment:

    a) To which volume group does the physical volume belong? _______________

    b) What is the physical partition size? _________________________________

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    53/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 9. Working with LVM 9-5

    4.1

    Xempty c) How many total physical partitions are there? __________________________

    d) How many of those physical partitions are used? _______________________

    e) What is the maximum transfer size? _________________________________

    Try other options for listing information about the physical volume you select.

    __ 21. List all of the logical volumes in the rootvg volume group.

    __ 22. Show the characteristics for the logical volume hd4. If you are using SMIT, for List

    OPTION use status.

    Find the information that is necessary to answer the following questions about your

    environment:

    a) To which volume group does it belong? ______________________________

    b) How many copies? ______________________________________________c) How many physical partitions is it? __________________________________

    d) How large is the logical volume in megabytes? _________________________

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    54/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    9-6 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Part 4 - Adding a volume group

    The completion of this section depends on having an available disk drive in your system

    that is not assigned to a volume group. Check for a disk drive that has not been assigned to

    a volume group (you can use the lspv command).

    If all disk drives are assigned, continue with the next section Adding a logical

    volume.

    Important

    Only one user per AIX system may complete this section. Please consult your

    teammates before continuing.

    __ 23. Only one physical volume has been defined to be a member of the rootvg volume

    group. Using an available physical volume located on your system, create a new

    volume group called datavg. Verify that the new volume group was successfully

    created.

    Part 5 - Adding a logical volume

    __ 24. Add a logical volume, which is one partition in size, to the datavg. (Note: If you only

    have one disk on your system, create the logical volume in rootvg.) Allocate the

    partitions on the outer edge of the disk. Allow the system to default the logical

    volume name and note the system generated name.__________________________________

    __ 25. Rename the logical volume created above to yylv (where yy represents the initials

    of your first and last name) instead of the system generated one, and verify that it

    has been renamed.

    __ 26. Extend the yylv logical volume by one partition and specify that the added partition

    be allocated on the outer edge of the disk. This logical volume is used in the nextexercise.

    End of exercise

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    55/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    Copyright IBM Corp. 1997, 2008 Exercise 10. Working with file systems 10-1

    4.1

    Xempty Exercise 10. Working with file systems

    What this exercise is about

    In this exercise the students are given the opportunity to work with file

    systems.

    What you should be able to do

    After completing this exercise, students should be able to:

    Add and remove an AIX file system

    Create an AIX file system specifying the number of bytes per inode

    Create an enhanced JFS (JFS2) file system and illustrate the

    AIX 6.1 file system shrink capability

    Mount and unmount a file system

    Extend a file system

    Add and remove mirrors

    Introduction

    In this exercise, you are using SMIT extensively to work with file

    systems. You add a file system to the logical volume you created in the

    previous exercise and then mount it so users can access the storagespace. You copy files into this file system and then experiment with

    unmounting and mounting the file system once again but in different

    locations. You also get an opportunity to remove a file system and

    create a file system. The last portion of the exercise provides exposure

    to creating a mirrored file system and then changing some

    characteristics of the mirrored file system.

  • 7/31/2019 Artle Hre System Ver Wal Tung 2010

    56/154

    Student Exercises

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

    10-2 AIX System Administration I Copyright IBM Corp. 1997, 2008

    Exercise Instructions

    Preface

    Two versions of these instructions are available; one with hints and one without. You

    can use either version to complete this exercise. Also, please dont hesitate to ask the

    instructor if you have questions.

    All exercises of this chapter depend on th